Thursday, 15 August 2013

FINGERPRINT-BASED EMAIL SECURITY MODEL

The knowledge of finding out the identity of a distinct entity based on the physical, behavioral or chemical characteristics of a person is called Biometrics. It originates from two words bios (means life) and metron (means measure). The biometrics is mostly used for employing the identity management in wide-ranging situations in which precise individual identification is fundamental.
Some of the biometric applications are employed in situations where the networks are being shared between the users, in electronically business deals (such as e-shopping and ATM stations) and in any other commercial transactions.

The identity identification may be essential for a variety of factors though the major goal, in most programs, will be to avert invaders from penetrating to the covered property. Three ways of creating a person’s identity comprise the following mechanism.
Most email messages are sent without any additional message encryption. The sender will send a message through internet via Sender's SMTP server which will be later passed to the recipient via recipient's POP/IMAP server. Although encryption is not added, the opportunity of identity spoofing, unauthorized message modification or interception is still possible.
Once a sender wants to send an encrypted message to an intended recipient, the sender should recognize whether the recipient has the reliable decryption tools or not; after that, he will get his public key corresponding to his private key Then, sender should load recipient's public key in the mail client and produce his own private/public key pairs  for signing purpose. Finally, signed text  will be encrypted by recipient's public key to form cipher text to be sent to the recipient. The recipient will decrypt the received message by his private key and verify sender's signature by his verification tool and sender's public key to reveal the message.

No comments:

Post a Comment